You are on page 1of 2

(1)itmbu.ac.in : 108.167.146.

199
(2)scanme.org : 45.33.32.156

Host Discovery:

ARP Ping Scan : nmap -sP -PR 108.167.146.199


UDP Ping Scan : nmap -sP -PU 108.167.146.199
ICMP Ping Scan(Echo) : nmap -sP -PE 108.167.146.199
ICMP Ping Scan(Timestamp) : nmap -sP -PP 108.167.146.199
ICMP Ping Scan(Address mask) : nmap -sP -PM 108.167.146.199
TCP Ping Scan(SYN) : nmap -sP -PS 108.167.146.199
TCP Ping Scan(ACK) : nmap -sP -PA 108.167.146.199
IP Protocol Scan : nmap -sP -PO 108.167.146.199

Port and Service Discovery:

TCP connect/Full Open scan : nmap -sT 108.167.146.199


Stealth Scan/TCP Half Open scan : nmap -sS 108.167.146.199
Xmas Scan : nmap -sX 108.167.146.199
TCP Maimon scan : nmap -sM 108.167.146.199
ACK Flag prob scan : nmap -sA 108.167.146.199
UDP Scan : nmap -sU 108.167.146.199
Service Version Discovery Scan : nmap -sV 108.167.146.199
Scan whole subnet using Aggressive Scan : nmap -A 108.167.146.199

OS Discovery : nmap -sV -O 108.167.146.199

TTL & Window Size :


Nmap Script Engine (NSE) : nmap -sC 108.167.146.199

IDS/Firewall Bypass:

Scan Beyond IDS/Firewall using various Evason Techniques:

1. Packet fragmentation : nmap -f 108.167.146.199


2. source port manipulation : nmap -g 80 108.167.146.199
3. source address manipulation : nmap -S 108.167.146.199
4. IP Adress Decoy : nmap -D RND:10 108.167.146.199
nmap -D 108.167.146.199,108.167.146.200,108.167.146.198

Scan Beyond IDS/Firewall using Nmap by creating custom packets

1. creating custom packets by appending custom binary data:


nmap 108.167.146.199 --data 0xdeadbeef
2. creating custom packets by appending custom strings:
nmap 108.167.146.199 --data-string "D0nt G1v3 UP"
3. creating custom packets by appending random data:
nmap 108.167.146.199 --data-length 4

Network Diagram using Network topology Mapper

using zenmap

You might also like